Sciweavers

1094 search results - page 85 / 219
» One Size Fits All
Sort
View
GECCO
2003
Springer
14 years 2 months ago
Chromosome Reuse in Genetic Algorithms
This paper introduces a novel genetic algorithm strategy based on the reuse of chromosomes from previous generations in the creation of offspring individuals. A number of chromoso...
Adnan Acan, Yüce Tekol
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
14 years 2 months ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
Forward-Secure Signatures with Optimal Signing and Verifying
We propose the first forward-secure signature scheme for which both signing and verifying are as efficient as for one of the most efficient ordinary signature schemes (Guillou-Qui...
Gene Itkis, Leonid Reyzin
ISMVL
2000
IEEE
105views Hardware» more  ISMVL 2000»
14 years 1 months ago
Computational Neurobiology Meets Semiconductor Engineering
Many believe that the most important result to come out of the last ten years of neural network research is the significant change in perspective in the neuroscience community tow...
Dan W. Hammerstrom
CIKM
1999
Springer
14 years 1 months ago
Page Access Scheduling in Join Processing
The join relational operation is one of the most expensive among database operations. In this study, we consider the problem of scheduling page accesses in join processing. This r...
Andrew Lim, Jennifer Lai-Pheng Kwan, Wee-Chong Oon